Submissions from 2016
THE COST OF SHARING: THE EFFECT OF SHARING INCLINATION ON INFORMATION OVERLOAD, Yannick Ouardi, Tarun Goyal, Lorenz Graf-Vlachy, Jan Mammen, Andreas König, and Carol Saunders
THE DUAL ROLE OF PENALTY: SERVICE LEVEL AGREEMENT DESIGN AND ITS EFFECTS ON INTRA-FIRM KNOWLEDGE SHARING AND COMMITMENT OF SERVICE PROVIDERS, Dennis D. Fehrenbacher
THE EFFECTS OF PERCEIVED WEBSITE COMPLEXITY - NEW INSIGHTS FROM THE CONTEXT OF MOBILE ONLINE SHOPS, Stefanie Sohn
THE EFFECTS OF SPATIAL AND TEMPORAL DISPERSION ON VIRTUAL TEAMS’ PERFORMANCE, Anqing Jiao, Kristina Egorova, Jungpil Hahn, and Gwanhoo Lee
THE FUTURE OF BUSINESS PROCESS MANAGEMENT IN THE FUTURE OF WORK, Georgi Kerpedzhiev, Martin Lehnert, and Maximilian Röglinger
THE IMPACT OF SECURITY BY DESIGN ON THE SUCCESS OF OPEN SOURCE SOFTWARE, Golriz Chehrazi, Irina Heimbach, and Oliver Hinz
THE INSTITUTIONALISATION OF MOBILE PAYMENT TECHNOLOGIES IN KENYA: RETAILERS’ PESPECTIVE, Carlo Stepcic and Salah Kabanda
THEMES OF COORDINATION IN IS REFERENCE THEORIES, Maximilian Brosius, Kazem Mohammad Haki, and Stephan Aier
THE ORGANIZATIONAL RIPPLE EFFECT OF IT ARCHITECTURE IN HEALTHCARE, Mikael Gebre-Mariam and Bendik Bygstad
THE PHENOMENON OF PROJECT OVERFUNDING ON ONLINE CROWDFUNDING PLATFORMS – ANALYZING THE DRIVERS OF OVERFUNDING, Jascha-Alexander Koch
THE ROLE OF GOAL FRAMES REGARDING THE IMPACT OF GAMIFIED PERSUASIVE SYSTEMS ON SUSTAINABLE MOBILITY BEHAVIOR, Carolin Ebermann and Benjamin Brauer
THE ROLE OF SHARED UNDERSTANDING IN DISTRIBUTED SCRUM DEVELOPMENT: AN EMPIRICAL ANALYSIS, Markus Hummel, Christoph Rosenkranz, and Roland Holten
THE TIMES THEY ARE A-CHANGIN FOR ICT SERVICE PROVISION: A CLOUD COMPUTING BUSINESS MODEL PERSPECTIVE, Trevor Clohessy, Thomas Acton, Lorraine Morgan, and Kieran Conboy
THE WORK OF BELONGING THROUGH TECHNOLOGY IN REMOTE WORK: A CASE STUDY IN TELE-NURSING, Ella Hafermalz and Kai Riemer
TO ADOPT OR NOT TO ADOPT: A LITERATURE REVIEW ON BARRIERS TO CITIZENS’ ADOPTION OF E-GOVERNMENT SERVICES, Bettina Distel and Nadine Ogonek
TOWARDS A BRIGHT FUTURE: ENHANCING DIFFUSION OF CONTINUOUS CLOUD SERVICE AUDITING BY THIRD PARTIES, Sebastian Lins, Heiner Teigeler, and Ali Sunyaev
TOWARDS A THEORY OF TRUST-BASED ACCEPTANCE OF AFFECTIVE TECHNOLOGY, Oliver Heger, Henrik Kampling, and Björn Niehaves
TOWARDS BEHAVIORAL MEASURES OF BOUNDARY SPANNING SUCCESS: THE EFFECTIVENESS AND EFFICIENCY OF TEAM BOUNDARY SPANNING IN ENTERPRISE SOCIAL MEDIA, Wietske Van Osch, Charles Steinfield, and Yanjie Zhao
TRANSFERRING CONTINUOUS AUDITING TO THE DIGITAL AGE – THE KNOWLEDGE BASE AFTER THREE DECADES OF RESEARCH, Andreas Kiesow, Tim Schomaker, and Oliver Thomas
TRANSFORMING ORGANIZATIONAL RESOURCE INTO PLATFORM BOUNDARY RESOURCES, Amir Mohagheghzadeh and Fredrik Svahn
TWITTER AND THE POLITICAL LANDSCAPE – A GRAPH ANALYSIS OF GERMAN POLITICIANS, Annika Baumann, Benjamin Fabian, Stefan Lessmann, and Lars Holzberg
TWO DECADES OF THE DARK SIDE IN THE INFORMATION SYSTEMS BASKET: SUGGESTING FIVE AREAS FOR FUTURE RESEARCH, Henri Pirkkalainen and Markus Salo
UNDERSTANDING IS COMPLEXITY AND THE HETEROGENEITY OF FRAMES: THE ILLUSION OF AGREEMENT, Erik Jochemsen, Mohammad Rezazade Mehrizi, Bart van den Hooff, and Marijn G.A. Plomp
UNDERSTANDING OBSTACLES IN ENTERPRISE ARCHITECTURE DEVELOPMENT, Negin Banaeianjahromi and Kari Smolander
UNDERSTANDING ONLINE FINANCIAL COMMUNITIES: WHAT CONSTITUTES A VALUABLE INFORMATION EXCHANGE FOR USERS?, Ann-Kathrin Hirzel, Michael Leyer, Nick Russell, Alistair Barros, and Jürgen Moormann
UNDERSTANDING THE ANATOMY OF DATA-DRIVEN BUSINESS MODELS – TOWARDS AN EMPIRICAL TAXONOMY, Adrian Engelbrecht, Jin Gerlach, and Thomas Widjaja
UNDERSTANDING THE UNDESIRABLE EFFECTS OF USING INTERORGANIZATIONAL SYSTEMS AND INTEGRATED INFORMATION SYSTEMS: CASE STUDIES AMONG SUPPLY CHAIN PARTNERS, Gwenaëlle Lairet, Frantz Rowe, and Bénédicte Geffroy
UNTANGLING GENERATIVITY: TWO PERSPECTIVES ON UNANTICIPATED CHANGE PRODUCED BY DIVERSE ACTORS, Alexander Eck and Falk Uebernickel
USING WITH DISCRETION: IDENTIFYING EMERGENT PRACTICES AROUND INTERACTIVE PUBLIC DISPLAYS, Leena Ventä-Olkkonen, Arto Lanamäki, Netta Iivari, and K. Kuutti
VALUE OF DECENTRALIZED CONSENSUS SYSTEMS – EVALUATION FRAMEWORK, Christian Brenig, Jonas Schwarz, and Nadine Rückeshäuser
WHAT ARE THE MOST IMPORTANT CRITERIA FOR CLOUD SERVICE PROVIDER SELECTION? A DELPHI STUDY, Michael Lang, Manuel Wiesche, and Helmut Krcmar
WHEN IS CROWDSOURCING ADVANTAGEOUS? THE CASE OF CROWDSOURCED SOFTWARE TESTING, Niklas Leicht, Nicolas Knop, Christoph Müller-Bloch, and Jan Marco Leimeister
WHEN TRAINING GETS TRUMPED: HOW DUAL-TASK INTERFERENCE INHIBITS SECURITY TRAINING, Jeffrey L. Jenkins, Bonnie Anderson, Anthony Osborn Vance, and Scott Jensen
WHY DO SHADOW SYSTEMS FAIL? AN EXPERT STUDY ON DETERMINANTS OF DISCONTINUATION, Daniel Fürstenau, Matthias Sandner, and Dimitrios Anapliotis
WHY DO WE NEED THIS? ROLES IN THE INFORMATION SYSTEM ACQUISITION LEGITIMATION PROCESS, Paula Mäki-Lohiluoma, Pasi Hellsten, and Samuli Pekkola
WHY PHUBBING IS TOXIC FOR YOUR RELATIONSHIP: UNDERSTANDING THE ROLE OF SMARTPHONE JEALOUSY AMONG “GENERATION Y” USERS, Hanna Krasnova, Olga Abramova, Isabelle Notter, and Annika Baumann